You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: en/pages/pleb_lessons.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -524,7 +524,7 @@ So your private key has been generated on this specialized device. Is your hardw
524
524
* Your transactions are created by Sparrow with help from your node and they need to be **signed** somehow with the private key. So Sparrow constructs the transaction, sends this transaction data (PSBT - Partially Signed Bitcoin Transaction) to the hardware wallet for signing and then it has to be communicated back to Sparrow for broadcasting the signed transaction to the network.
525
525
* Addresses have to be communicated to the hardware wallet from Sparrow to be able to verify them
526
526
527
-
So what you do is create another type of wallet in Sparrow that specifically serves these separated functions. Wallets of this kind with only limited functionality have different names. **“Watch-only”** wallet is when only the public key is online so we can only watch the balance and the history, and of course generate new receive addresses from the Xpub. **“Air-gapped”** wallets refers to the special case when the unsafe networked computer(running Sparrow) is not just separated but there is **never a cabled connection** between it and the hardware wallet.
527
+
So what you do is create another type of wallet in Sparrow that specifically serves these separated functions. Wallets of this kind with only limited functionality have different names. **“Watch-only”** wallet is when only the public key is online so we can only watch the balance and the history, and of course generate new receive addresses from the Xpub. **“Air-gapped”** wallets refers to the special case when the unsafe networked computer(running Sparrow) is not just separated but there is **never a cabled connection** between it and the hardware wallet.
528
528
529
529
This separation of course introduces some additional steps in the wallet management procedures but it is not that big of a deal.
530
530
@@ -860,7 +860,7 @@ Read more about full nodes [here](https://bitcoin.org/en/full-node)
860
860
## Light clients
861
861
{: .no_toc }
862
862
863
-
Light clients are nodes that don’t store the whole Blockchain but can still verify certain consensus rules. Since they don’t store the whole blockchain, just the block headers, they rely on full nodes to verify most consensus rules and can only do a so-called “Simple Payment Verification(SPV)”. That is, they are not fully sovereign. This is a major trade-off of light clients.
863
+
Light clients are nodes that don’t store the whole Blockchain but can still verify certain consensus rules. Since they don’t store the whole blockchain, just the block headers, they rely on full nodes to verify most consensus rules and can only do a so-called “Simple Payment Verification(SPV)”. That is, they are not fully sovereign. This is a major trade-off of light clients.
864
864
865
865
Light clients are for those with limited bandwidth or storage capacity. Since the whole blockchain today doesn’t take up more than a few hundred gigabytes of data and bandwidth is not too bad in most places either, it doesn’t make all too much sense running it. I recommend running a full node since you already decided to make the effort of running a Bitcoin node.
866
866
@@ -1000,7 +1000,7 @@ Here are P2P exchange platforms that I can recommend at the moment:
1000
1000
*[Bisq](https://bisq.network/): The go-to for the lovers of decentralization. Both parties need to deposit a percentage of the trade value into escrow before the trade. No company runs Bisq but a “DAO” (decentralized autonomous organization) of contributors. This DAO is quite a shitcoin show but hey, it is a great product so let’s give them a little benefit of the doubt.
1001
1001
Bisq runs its own hot SPV wallet and runs through Tor by default so you just download, verify, install, configure fiat rails and start stacking sats. It has quite decent liquidity with lower premiums than most platforms.
1002
1002
It uses a 2 of 2 multisig escrow so both parties have to unlock the coins to settle the trade. There is a mediation option conducted by volunteers but at the end of the day you just have to come to terms with your counterparty.
1003
-
Fiat accounts are trusted in Bisq through a process called “signing” where you must complete a trade with an already trusted(signed) account and wait some time in order to get your fiat account signed too. This mitigates some fiat chargeback risk. Don’t forget to withdraw funds from the hot wallet to your cold storage. You can introduce an intermediate coinjoin step in the process
1003
+
Fiat accounts are trusted in Bisq through a process called “signing” where you must complete a trade with an already trusted(signed) account and wait some time in order to get your fiat account signed too. This mitigates some fiat chargeback risk. Don’t forget to withdraw funds from the hot wallet to your cold storage. You can introduce an intermediate coinjoin step in the process
1004
1004
1005
1005
---
1006
1006
@@ -1170,7 +1170,7 @@ Multisig makes sense when you study the meaning of this word commonly used in mu
1170
1170
1171
1171
First you have to designate the people eligible for voting and a ruleset or constitution to abide by in votes. This is when you create the multisig wallet in a coordinator wallet software like Sparrow wallet.
1172
1172
1173
-
The wallet software registers the multisig public keys/Xpubs in the quorum (members/possible voters) and also registers the quorum signature threshold(minimum number of votes necessary for a successful vote). A special file is generated: The Wallet Output **Descriptor**. It can be thought of as the **constitution** of the voting committee.
1173
+
The wallet software registers the multisig public keys/Xpubs in the quorum (members/possible voters) and also registers the quorum signature threshold(minimum number of votes necessary for a successful vote). A special file is generated: The Wallet Output **Descriptor**. It can be thought of as the **constitution** of the voting committee.
1174
1174
1175
1175
It can define rules like 2 of 3 majority voting or 3 of 5. But it can also define e.g. 1 of 3, so a minority can also get a successful vote in some setups. Of course there is also the consensus voting mechanism which demands all possible signatories to sign. 2 of 2, 3 of 3 etc.
Copy file name to clipboardExpand all lines: en/pages/quest-2-get-on-board.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -181,11 +181,11 @@ The Tor browser is a powerful privacy tool to fend off snoopers trying to monito
181
181
182
182
Tor is great for looking up simple info but can be a painfully slow experience and time is the scarcest of all things. Instead you can browse with Firefox or [Mullvad browser](https://mullvad.net/en/browser){:target="_blank"} coupled with [Proton](https://protonvpn.com/){:target="_blank"}- or [Mullvad](https://mullvad.net/en){:target="_blank"} VPN service enabled on the desktop. VPN is great but choose wisely because many of the services out there are just a fraud and you trust them not to log your activities and they can start logging without notice anytime the government asks them to do so.
183
183
184
-
## OBJECTIVE: Download, verify and Install Tor browser(process similar to Mullvad browser)([Progress images](/en/progress-get-on-board/){:target="_blank"})
184
+
## OBJECTIVE: Download, verify and Install Tor browser(process similar to Mullvad browser)([Progress images](/en/progress-get-on-board/){:target="_blank"})
185
185
1. 💡 Learn about [Verification of digital information](/en/pleb-lessons/#verifying-digital-information)
186
-
2. Your Ubuntu came with a handy tool to use for encryption and verification: GPG(Gnu Privacy Guard, implementing the OpenPGP standard). Open a terminal to use it
187
-
1. Super + start typing “terminal”(add to favorites with right-click)
188
-
3. Go to the [website](https://www.torproject.org/){:target="_blank"} of the Tor project. It should be a simple https website(check the little lock icon in the address bar)
186
+
2. Your Ubuntu came with a handy tool to use for encryption and verification: GPG(Gnu Privacy Guard, implementing the OpenPGP standard). Open a terminal to use it
187
+
1. Super + start typing “terminal”(add to favorites with right-click)
188
+
3. Go to the [website](https://www.torproject.org/){:target="_blank"} of the Tor project. It should be a simple https website(check the little lock icon in the address bar)
189
189
4. Go to `Download Tor Browser` and select Linux
190
190
5. Download the signature file as well
191
191
6. In the terminal navigate into the download directory
@@ -230,8 +230,8 @@ When you are doing anything bitcoin-related the most interaction is going to be
230
230
1. Open Firefox browser and navigate to the [Sparrow wallet website](https://sparrowwallet.com/){:target="_blank"}(clearnet link)
231
231
1. Download is very slow on Tor browser but you can try
232
232
2. Go to Download and navigate to version 1.7.6 in [previous releases](https://github.com/sparrowwallet/sparrow/releases/tag/1.7.6){:target="_blank"}(known working version with the this course)
233
-
3. Download these files(click “show all assets” to expand the list)
234
-
* sparrow_1.7.6.1_amd64.deb(debian 64-bit linux package, no server in name!)
233
+
3. Download these files(click “show all assets” to expand the list)
234
+
* sparrow_1.7.6.1_amd64.deb(debian 64-bit linux package, no server in name!)
235
235
* …manifest.txt file
236
236
* …manifest.txt.**asc** file
237
237
4. Verify the downloaded software according to [instructions](https://sparrowwallet.com/download/){:target="_blank"}:
Copy file name to clipboardExpand all lines: en/pages/quest-3-journey-begins.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ lang: en
18
18
19
19
---
20
20
21
-
**Important Note**: You are going to use Bitcoin Testnet(specifically the latest and most stable one called “signet”) to simulate a life-like environment where you can safely hone your Pleb skills and experiment!
21
+
**Important Note**: You are going to use Bitcoin Testnet(specifically the latest and most stable one called “signet”) to simulate a life-like environment where you can safely hone your Pleb skills and experiment!
22
22
23
23
Feel free to not just complete the exercises but also try out other exciting things! You can’t really screw anything up once you’ve made sure you’re using testnet which will be obvious to check.
Copy file name to clipboardExpand all lines: en/pages/quest-5-order-and-entropy.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ lang: en
23
23
24
24
Since your **paper notebook** contains sensitive private information about your bitcoin-related things it is ill-advised to keep it in plain text on your desk in the long run. Also, backing up and updating hand-written text if anything changes is an arduous task.
25
25
26
-
You might also have some important **digital notes** unencrypted on your computer, and also some important details about your bitcoin citadel(self-custody system) only **in your head**. It is better to store and manage all this intelligence in one safe place. You have to switch to offline digital encrypted passwords and notes. An open-source popular choice is **KeePassXC**(formerly KeePass):
26
+
You might also have some important **digital notes** unencrypted on your computer, and also some important details about your bitcoin citadel(self-custody system) only **in your head**. It is better to store and manage all this intelligence in one safe place. You have to switch to offline digital encrypted passwords and notes. An open-source popular choice is **KeePassXC**(formerly KeePass):
27
27
{:target="_blank"}
28
28
29
29
## OBJECTIVE: Start using KeePassXC ([Progress Images](/en/progress-order-and-entropy/){:target="_blank"})
@@ -72,11 +72,11 @@ Note how open source code ensures eternal access because even if KeePass ceased
72
72
73
73
Another very important feature of open source is that it is much easier to find bugs in the software because if it is of value to people you can expect many eyes to scrutinize the code and hunt any defects.
74
74
75
-
A proprietary software suffers from the problem of much fewer(and lazier in many cases) eyes inspecting the code and guess what happens if the company goes down(always the casein the time horizon you need for bitcoin)? No more support and the code is gone so no easy fixes either. You are at the whims of corporate people to help you if they can and if they are allowed, out of sheer altruism. Not a great insurance if you ask me.
75
+
A proprietary software suffers from the problem of much fewer(and lazier in many cases) eyes inspecting the code and guess what happens if the company goes down(always the casein the time horizon you need for bitcoin)? No more support and the code is gone so no easy fixes either. You are at the whims of corporate people to help you if they can and if they are allowed, out of sheer altruism. Not a great insurance if you ask me.
76
76
77
77
When it comes to Bitcoin, go for simple, effective, tried and tested, long life-span, verifiable and modifiable software which is free, open source and standards-based in a nutshell. Don’t fall for convenience and unnecessary bells and whistles.
78
78
79
-
Since hardware is mostly proprietary today you cannot apply the same approach to it as to software but you can still verify proper functioning of your Bitcoin hardware as you did with your hardware wallet. Get in the mindset of coming up with clever ways to verify things(and people) around you. This is the essence of adversarial thinking without the paranoia part.
79
+
Since hardware is mostly proprietary today you cannot apply the same approach to it as to software but you can still verify proper functioning of your Bitcoin hardware as you did with your hardware wallet. Get in the mindset of coming up with clever ways to verify things(and people) around you. This is the essence of adversarial thinking without the paranoia part.
80
80
81
81
Your first line of defense is your skills and knowledge. However, a strong community of Plebs is essential to keep your knowledge and information always up to date. Check in from time to time because you are not alone!
0 commit comments